Siemens SCALANCE X Switches (Update B)
SCALANCE X switches do not generate a unique random key after factory reset and instead use a hardcoded private key that is shipped with the firmware. This hardcoded key is the same across all devices of the same model and firmware version. An attacker who obtains or derives this private key can decrypt TLS/HTTPS traffic to the device, impersonate the switch, or intercept and modify encrypted management communications. The vulnerability affects the X-200, X-200IRT, X-200RNA, and X-300 switch families across multiple firmware versions. Siemens has released patched firmware versions that generate unique keys during initialization.
- Network access to the SCALANCE X switch (typically management ports like 80/443 or Modbus TCP port 502)
- Ability to capture encrypted traffic or initiate TLS connections to the device
- Knowledge of the hardcoded private key (which is shipped in all firmware images and publicly documented in Siemens advisory SSA-274900)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/02ac4ef4-fd81-40a3-a3d5-94e2f4bf390cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.